Which of the following protocols would be MOST important in preserving digital evidence of criminal activity during an investigation?
A. Change control management
B. Chain of custody
C. Channel escalation
D. MSDS documents
Answer: B. Chain of custody
Computer Science & Information Technology
You might also like to view...
Minimizing data redundancy is one of the benefits of normalization
Indicate whether the statement is true or false
Computer Science & Information Technology
private fields of a base class can be accessed in a derived class
a) by calling private methods declared in the base class b) by calling public or protected methods declared in the base class c) directly d) All of the above
Computer Science & Information Technology